_ _ _ _ _ _ _ _ _ _ _ _ _
It is important to note that probably no large operating system using current design technology can withstand a determined and well-coordinated attack, and that most such documented penetrations have been remarkably easy. -B. Hebbard, "A Penetration Analysis of the Michigan Terminal System", Operating Systems Review, Vol. 14, No. 1, June 1980, pp. 7-20
_ _ _ _ _ _ _ _ _ _ _ _ _
^__^ (..)\_______ (__)\ )\/\ ||----w | || ||
echo 'Olá' | write nomeutilizador